search for: oom_adjust_restor

Displaying 11 results from an estimated 11 matches for "oom_adjust_restor".

Did you mean: oom_adjust_restore
2013 Sep 21
1
[PATCH] Fix oom_adj on Linux after sshd reload
Currently, on linux sshd attempts to remove itself from the influence of oom-killer by modifying the oom_adj parameter for itself in proc to -17. This is controlled via two functions; oom_adjust_setup() and oom_adjust_restore(). Setup saves the old score (typically zero on initialization) and sets sshd to -17 whilst oom_adjust_restore places the saved value from initialization back into the running sshd process. The principle here being that whilst we want the main sshd listener process never to be oom-killed, we wan...
2013 Sep 21
2
[Bug 2156] New: Fix oom_adj on Linux after sshd reload
...ndrot.org/attachment.cgi?id=2342&action=edit Make oom_adj reset before re-execing sshd Currently, on linux sshd attempts to remove itself from the influence of oom-killer by modifying the oom_adj parameter for itself in proc to -17. This is controlled via two functions; oom_adjust_setup() and oom_adjust_restore(). Setup saves the old score (typically zero on initialization) and sets sshd to -17 whilst oom_adjust_restore places the saved value from initialization back into the running sshd process. The principle here being that whilst we want the main sshd listener process never to be oom-killed, we wan...
2011 May 30
1
Fwd: Re: Fwd: cgroup OOM killer loop causes system to lockup (possible fix included) - now pinpointed to openssh-server
...3372 ? Ss 21:50 0:00 \_ sshd: root at pts/1 root at courtney:~/openssh-5.5p1# ps faux | grep "4821" root 4821 0.0 0.0 49168 1160 ? Ss 21:50 0:00 /usr/sbin/sshd root at courtney:~/openssh-5.5p1# cat /var/log/auth.log | grep -e "Set" -e "oom_adjust_restore" May 30 21:50:15 courtney sshd[4821]: Set /proc/self/oom_adj from 0 to -17 May 30 21:50:26 courtney sshd[4848]: debug3: oom_adjust_restore May 30 21:50:26 courtney sshd[4848]: Set /proc/self/oom_adj to 0 On 30/05/2011 21:30, Cal Leeming [Simplicity Media Ltd] wrote: > Hi all, > >...
2022 Dec 20
36
[Bug 3512] New: net-misc/openssh-9.1_p1: stopped accepting connections after upgrade to sys-libs/glibc-2.36 (fatal: ssh_sandbox_violation: unexpected system call)
...Reporter: jussi.koponen at iki.fi After updating to sys-libs/glibc-2.36-r5 sshd stopped accepting connections: debug3: fd 6 is not O_NONBLOCK debug1: Forked child 5799. debug3: send_rexec_state: entering fd = 9 config len 3506 debug3: ssh_msg_send: type 0 debug3: send_rexec_state: done debug3: oom_adjust_restore debug1: Set /proc/self/oom_score_adj to 0 debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9 debug1: inetd sockets after dupping: 4, 4 debug1: Local version string SSH-2.0-OpenSSH_9.1 debug1: Remote protocol version 2.0, remote software version OpenSSH_8.6 debug1: compat_banner: match: OpenSSH...
2023 Dec 02
33
[Bug 3639] New: server thread aborts during client login after receiving SSH2_MSG_KEXINIT
https://bugzilla.mindrot.org/show_bug.cgi?id=3639 Bug ID: 3639 Summary: server thread aborts during client login after receiving SSH2_MSG_KEXINIT Product: Portable OpenSSH Version: 9.2p1 Hardware: ARM OS: Linux Status: NEW Severity: critical Priority: P5 Component:
2008 May 25
19
[Bug 1470] New: adjust Linux out-of-memory killer to stop sshd being killed
https://bugzilla.mindrot.org/show_bug.cgi?id=1470 Summary: adjust Linux out-of-memory killer to stop sshd being killed Classification: Unclassified Product: Portable OpenSSH Version: 5.0p1 Platform: All URL: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=34176 7 OS/Version: Linux
2024 Jun 15
11
[Bug 3702] New: sshd fork crashed when compiled with seccomp
https://bugzilla.mindrot.org/show_bug.cgi?id=3702 Bug ID: 3702 Summary: sshd fork crashed when compiled with seccomp Product: Portable OpenSSH Version: 9.7p1 Hardware: ARM64 OS: Linux Status: NEW Severity: minor Priority: P5 Component: sshd Assignee: unassigned-bugs at
2020 Jul 07
3
libssh2 is hanging during a file transfert
...hd[31175]: debug1: Forked child 19126. Jul 7 11:52:15 TOTO sshd[31175]: debug3: send_rexec_state: entering fd = 9 config len 970 Jul 7 11:52:15 TOTO sshd[31175]: debug3: ssh_msg_send: type 0 Jul 7 11:52:15 TOTO sshd[31175]: debug3: send_rexec_state: done Jul 7 11:52:15 TOTO sshd[19126]: debug3: oom_adjust_restore Jul 7 11:52:15 TOTO sshd[19126]: debug1: Set /proc/self/oom_score_adj to 0 Jul 7 11:52:15 TOTO sshd[19126]: debug1: rexec start in 6 out 6 newsock 6 pipe 8 sock 9 Jul 7 11:52:15 TOTO sshd[19126]: debug1: inetd sockets after dupping: 5, 5 Jul 7 11:52:15 TOTO sshd[19126]: Connection from 10.91.1...
2014 Dec 23
2
chaining AUTH methods -- adding GoogleAuthenticator 2nd Factor to pubkey auth? can't get the GA prompt :-/
On Tue, 23 Dec 2014, Dmt Ops wrote: > testing goole-authenticator's standalone functionality, it > > > cd google-authenticator/libpam/ > > ./demo > Verification code: 123456 > Login failed > Invalid verification code > > > > fails with an INVALID code, and > > > ./demo > Verification code:
2016 Nov 21
42
[Bug 2641] New: Add systemd notify code to to track running server
https://bugzilla.mindrot.org/show_bug.cgi?id=2641 Bug ID: 2641 Summary: Add systemd notify code to to track running server Product: Portable OpenSSH Version: 7.3p1 Hardware: Other OS: Linux Status: NEW Severity: enhancement Priority: P5 Component: sshd Assignee:
2019 Mar 27
26
Call for testing: OpenSSH 8.0
Hi, OpenSSH 8.0p1 is almost ready for release, so we would appreciate testing on as many platforms and systems as possible. Snapshot releases for portable OpenSSH are available from http://www.mindrot.org/openssh_snap/ The OpenBSD version is available in CVS HEAD: http://www.openbsd.org/anoncvs.html Portable OpenSSH is also available via git using the instructions at